Received: by 2002:a05:6358:a55:b0:ec:fcf4:3ecf with SMTP id 21csp550664rwb; Fri, 13 Jan 2023 00:53:13 -0800 (PST) X-Google-Smtp-Source: AMrXdXsafNZV7RWAsBZprU9rqGlGgYd4LnKAkyOMMqq8TAB2BKU5qkNEtBS0HwImYLUS7eohTA/x X-Received: by 2002:a05:6a20:3d85:b0:9e:ae77:aad7 with SMTP id s5-20020a056a203d8500b0009eae77aad7mr127269895pzi.29.1673599993104; Fri, 13 Jan 2023 00:53:13 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1673599993; cv=none; d=google.com; s=arc-20160816; b=Mu1xleGxB0dbwtUFqQtI/xViTGnVwZNLHuTDggG1uynvwNgf5zBGF9LeP7Ntdahjs/ bx26OW3Qr2sSvUnjL8VKxo4ju2szjcm5/RzHOSYcQg3DUtQKAbjTqC9h9NZeEeURp9WE 50W6XrBT18yWdm8Mc8Mx4CUYEe1DQwMf5QwMjvxTh7/+ApdV24YScXkDXKgrG36f59VJ ay1HD05NrkWASzWx9+6yG6nLFF5NsFwJagJDbYe2Vw9bAZvwodLTZWTV2R1M8bRMIUzH Yf2XvU0Kt07JFIkJZVTw2CGudjNB8WN0RJpZ7rpyl2F7OoWo6ph+20vlnGmpB4SjhIEx 3mgg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:in-reply-to:from :content-language:references:cc:to:subject:user-agent:mime-version :date:message-id; bh=0VYTDilwUFTtTkx2fvVCP7jh+o555rFOHs1Yu6hPp7Q=; b=NinkeZ/8W3bGclAHdn36WuBtzscQaoPXFm1jq+o0Sw8ab7vKNYO6gLleND8E6En5Vf gBOW9wZN96vtxj3wD73cQn/pUYUmaeQrUhACfw0avuUPqZKLolle0K01TqoHmpnAsnEL 3j3sH+LAOQAufjTUAUiHFuSDYFLYls5A/6UR/8fcPlm+Yq7GiyyLyDv0X9RmGe4KlRE9 KZIbnlNMhpzd4ikk4i/nNed1RDtAsiHzBIimCeM0DO6bg02qU1LZUqmL0oLwpPHyWB3G XHC/MpADFOb9g1lzk9olf4DaBbiRrmU4bvCA6mRhYzaa1toKl2lg5u5YTh/8zixRFbUS hDxw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id i185-20020a6387c2000000b004bec17d1700si3604731pge.725.2023.01.13.00.53.06; Fri, 13 Jan 2023 00:53:13 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S237550AbjAMIS7 (ORCPT + 50 others); Fri, 13 Jan 2023 03:18:59 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:58096 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S232051AbjAMIR7 (ORCPT ); Fri, 13 Jan 2023 03:17:59 -0500 Received: from cmx-torrgo001.bell.net (mta-tor-003.bell.net [209.71.212.30]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id D99D03BE82; Fri, 13 Jan 2023 00:15:21 -0800 (PST) X-RG-CM-BuS: 0 X-RG-CM-SC: 0 X-RG-CM: Clean X-Originating-IP: [70.54.81.233] X-RG-Env-Sender: matt.fagnani@bell.net X-RG-Rigid: 63BF20AC00273F9D X-CM-Envelope: MS4xfIYNrOaeC9tjI2qK0BmHN2S6byp/GkK2zmxlZp0dpEHnnyg/Vh+D8gsyJOC54lv15t8Zb6DUhOLvrI2veZZdG5ZvuU8t2rVHXB3ZleLhNtuUodh4rKx6 Cq1254lt+HOjKSuzuDWCX+v5sYxKyuxL5HftMWPuc6O0V+DAXYpUihXqDs+wZwQOwtkHs27O1fhTazXOnYiEbV/4KsLWxxuWWZ8STMCg42ngR/TaoqwTYONG cW0xkcHI2XpgjJFmQB4mjO43leEgk2fU7/0YGurKwTEGowCVOOsi2RTmpMB6NAojDev8MD8i3YU+AbeIGNfkTVGFdpXIFgYqDOhBtDQUCpDOReSDxrK+GWj/ d2q084l1mHk0tAFKtBTmSa9zGKpRO1H2ag790v23ssMs/H7x+F7Vmu7dOTvgj8rvsvBQrMcqks59yzo0erwU7t81YsAviPQxjaEAMjAiUODS4HiMM2rIJVJv WUNnIB/hF4Ce9Hx1rjwqnWuTzTEvQKxej7/7Yafb/8x/l+J1xc6H3mY7kLv6fL9+KhBgH//Z8Obhc0sk X-CM-Analysis: v=2.4 cv=VfAxfnl9 c=1 sm=1 tr=0 ts=63c11305 a=qajjuPryiup/b0YLLwyWzQ==:117 a=qajjuPryiup/b0YLLwyWzQ==:17 a=IkcTkHD0fZMA:10 a=lAgNKBcoAAAA:8 a=VwQbUJbxAAAA:8 a=FBHGMhGWAAAA:8 a=Ikd4Dj_1AAAA:8 a=zd2uoN0lAAAA:8 a=QyXUC8HyAAAA:8 a=uejMiK2NbKTXA1iQnRwA:9 a=QEXdDO2ut3YA:10 a=-FEs8UIgK8oA:10 a=drE6d5tx1tjNRBs8zHOc:22 a=AjGcO6oz07-iQ99wixmX:22 a=9gvnlMMaQFpL9xblJ6ne:22 Received: from [192.168.2.10] (70.54.81.233) by cmx-torrgo001.bell.net (5.8.807) (authenticated as matt.fagnani@bell.net) id 63BF20AC00273F9D; Fri, 13 Jan 2023 03:15:01 -0500 Message-ID: Date: Fri, 13 Jan 2023 03:15:00 -0500 MIME-Version: 1.0 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:109.0) Gecko/20100101 Firefox/110.0 Thunderbird/110.0a1 Subject: Re: [PATCH v2 1/1] PCI: Add translated request only flag for pci_enable_pasid() To: Lu Baolu , Bjorn Helgaas , Joerg Roedel Cc: =?UTF-8?Q?Christian_K=C3=B6nig?= , Jason Gunthorpe , Kevin Tian , Vasant Hegde , Tony Zhu , linux-pci@vger.kernel.org, iommu@lists.linux.dev, linux-kernel@vger.kernel.org References: <20230113014409.752405-1-baolu.lu@linux.intel.com> Content-Language: en-US From: Matt Fagnani In-Reply-To: <20230113014409.752405-1-baolu.lu@linux.intel.com> Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-1.9 required=5.0 tests=BAYES_00,NICE_REPLY_A, RCVD_IN_MSPIKE_H2,SPF_HELO_PASS,SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Baolu, 6.2-rc3 with v2 of this patch applied booted normally without the black screen problem. regzbot by Thorsten Leemhuis recommends adding the following link tag to the previous discussion at https://linux-regtracking.leemhuis.info/regzbot/mainline/ "When fixing, add this to the commit message to make regzbot notice patch postings and commits to resolve the issue:" Link: https://lore.kernel.org/r/15d0f9ff-2a56-b3e9-5b45-e6b23300ae3b@leemhuis.info/ Thanks, Matt On 1/12/23 20:44, Lu Baolu wrote: > The PCIe fabric routes Memory Requests based on the TLP address, ignoring > the PASID. In order to ensure system integrity, commit 201007ef707a ("PCI: > Enable PASID only when ACS RR & UF enabled on upstream path") requires > some ACS features being supported on device's upstream path when enabling > PCI/PASID. > > One alternative is ATS which lets the device resolve the PASID+addr pair > before a memory request is made into a routeable TLB address through the > TA. Those resolved addresses are then cached on the device instead of > in the IOMMU TLB and the device always sets the translated bit for PASID. > One example of those devices are AMD graphic devices that always have ACS > or ATS enabled together with PASID. > > This adds a flag parameter in the pci_enable_pasid() helper, with which > the device driver could opt-in the fact that device always sets the > translated bit for PASID. > > It also applies this opt-in for AMD graphic devices. Without this change, > kernel boots to black screen on a system with below AMD graphic device: > > 00:01.0 VGA compatible controller: Advanced Micro Devices, Inc. > [AMD/ATI] Wani [Radeon R5/R6/R7 Graphics] (rev ca) > (prog-if 00 [VGA controller]) > DeviceName: ATI EG BROADWAY > Subsystem: Hewlett-Packard Company Device 8332 > > At present, it is a common practice to enable/disable PCI PASID in the > iommu drivers. Considering that the device driver knows more about the > specific device, we will follow up by moving pci_enable_pasid() into > the specific device drivers. > > Fixes: 201007ef707a ("PCI: Enable PASID only when ACS RR & UF enabled on upstream path") > Link: https://bugzilla.kernel.org/show_bug.cgi?id=216865 > Reported-by: Matt Fagnani > Suggested-by: Jason Gunthorpe > Suggested-by: Christian König > Signed-off-by: Lu Baolu > --- > include/linux/pci-ats.h | 6 ++++-- > drivers/iommu/amd/iommu.c | 2 +- > drivers/iommu/arm/arm-smmu-v3/arm-smmu-v3.c | 2 +- > drivers/iommu/intel/iommu.c | 3 ++- > drivers/pci/ats.c | 8 ++++++-- > 5 files changed, 14 insertions(+), 7 deletions(-) > > Change log: > v2: > - Convert the bool to a named flag; > - Convert TRANSLED to XLATED. > > v1: > - https://lore.kernel.org/linux-iommu/20230112084629.737653-1-baolu.lu@linux.intel.com/ > > diff --git a/include/linux/pci-ats.h b/include/linux/pci-ats.h > index df54cd5b15db..750fca736ef4 100644 > --- a/include/linux/pci-ats.h > +++ b/include/linux/pci-ats.h > @@ -4,6 +4,8 @@ > > #include > > +#define PCI_PASID_XLATED_REQ_ONLY BIT(0) > + > #ifdef CONFIG_PCI_ATS > /* Address Translation Service */ > bool pci_ats_supported(struct pci_dev *dev); > @@ -35,12 +37,12 @@ static inline bool pci_pri_supported(struct pci_dev *pdev) > #endif /* CONFIG_PCI_PRI */ > > #ifdef CONFIG_PCI_PASID > -int pci_enable_pasid(struct pci_dev *pdev, int features); > +int pci_enable_pasid(struct pci_dev *pdev, int features, int flags); > void pci_disable_pasid(struct pci_dev *pdev); > int pci_pasid_features(struct pci_dev *pdev); > int pci_max_pasids(struct pci_dev *pdev); > #else /* CONFIG_PCI_PASID */ > -static inline int pci_enable_pasid(struct pci_dev *pdev, int features) > +static inline int pci_enable_pasid(struct pci_dev *pdev, int features, int flags) > { return -EINVAL; } > static inline void pci_disable_pasid(struct pci_dev *pdev) { } > static inline int pci_pasid_features(struct pci_dev *pdev) > diff --git a/drivers/iommu/amd/iommu.c b/drivers/iommu/amd/iommu.c > index cbeaab55c0db..64a8c03d7dfa 100644 > --- a/drivers/iommu/amd/iommu.c > +++ b/drivers/iommu/amd/iommu.c > @@ -1700,7 +1700,7 @@ static int pdev_pri_ats_enable(struct pci_dev *pdev) > int ret; > > /* Only allow access to user-accessible pages */ > - ret = pci_enable_pasid(pdev, 0); > + ret = pci_enable_pasid(pdev, 0, PCI_PASID_XLATED_REQ_ONLY); > if (ret) > goto out_err; > > diff --git a/drivers/iommu/arm/arm-smmu-v3/arm-smmu-v3.c b/drivers/iommu/arm/arm-smmu-v3/arm-smmu-v3.c > index ab160198edd6..891bf53c45dc 100644 > --- a/drivers/iommu/arm/arm-smmu-v3/arm-smmu-v3.c > +++ b/drivers/iommu/arm/arm-smmu-v3/arm-smmu-v3.c > @@ -2350,7 +2350,7 @@ static int arm_smmu_enable_pasid(struct arm_smmu_master *master) > if (num_pasids <= 0) > return num_pasids; > > - ret = pci_enable_pasid(pdev, features); > + ret = pci_enable_pasid(pdev, features, 0); > if (ret) { > dev_err(&pdev->dev, "Failed to enable PASID\n"); > return ret; > diff --git a/drivers/iommu/intel/iommu.c b/drivers/iommu/intel/iommu.c > index 59df7e42fd53..5cc13f02a5ac 100644 > --- a/drivers/iommu/intel/iommu.c > +++ b/drivers/iommu/intel/iommu.c > @@ -1425,7 +1425,8 @@ static void iommu_enable_pci_caps(struct device_domain_info *info) > undefined. So always enable PASID support on devices which > have it, even if we can't yet know if we're ever going to > use it. */ > - if (info->pasid_supported && !pci_enable_pasid(pdev, info->pasid_supported & ~1)) > + if (info->pasid_supported && > + !pci_enable_pasid(pdev, info->pasid_supported & ~1, 0)) > info->pasid_enabled = 1; > > if (info->pri_supported && > diff --git a/drivers/pci/ats.c b/drivers/pci/ats.c > index f9cc2e10b676..3a2d9e0ba1d8 100644 > --- a/drivers/pci/ats.c > +++ b/drivers/pci/ats.c > @@ -353,12 +353,15 @@ void pci_pasid_init(struct pci_dev *pdev) > * pci_enable_pasid - Enable the PASID capability > * @pdev: PCI device structure > * @features: Features to enable > + * @flags: device-specific flags > + * - PCI_PASID_XLATED_REQ_ONLY: The PCI device only issues PASID > + * memory requests of translated type. > * > * Returns 0 on success, negative value on error. This function checks > * whether the features are actually supported by the device and returns > * an error if not. > */ > -int pci_enable_pasid(struct pci_dev *pdev, int features) > +int pci_enable_pasid(struct pci_dev *pdev, int features, int flags) > { > u16 control, supported; > int pasid = pdev->pasid_cap; > @@ -382,7 +385,8 @@ int pci_enable_pasid(struct pci_dev *pdev, int features) > if (!pasid) > return -EINVAL; > > - if (!pci_acs_path_enabled(pdev, NULL, PCI_ACS_RR | PCI_ACS_UF)) > + if (!(flags & PCI_PASID_XLATED_REQ_ONLY) && > + !pci_acs_path_enabled(pdev, NULL, PCI_ACS_RR | PCI_ACS_UF)) > return -EINVAL; > > pci_read_config_word(pdev, pasid + PCI_PASID_CAP, &supported);